Data

- And so, the data layer of the Defense in Depth Model…was definitely one that, I think,…most folks seem to understand.…It's one of the ones we just make assumptions around.…We assume the data is secure,…we assume the data is always protected.…And remember, we're talking about an architecture.…We're talking about, really, a thought model,…or a thought process, for looking at security.…So we're going to avoid really specific details,…or really specific implementation recommendations here,…and just talk about the concept of at the data layer…of the Defense in Depth Model, what does that mean?…What are we talking about…when we talk about protecting data?…And, I tend to subdivide these two things,…into data at rest, and data in transit.…

Data at rest, simply means data file written on a hard drive…or some information stored on a thumb drive,…or some information that's actually kept somewhere…where it's not moving, that's pretty obvious, right?…At rest, not moving, versus in transit,…data flying across a network,…

Resume Transcript Auto-Scroll

Author

Released

4/3/2013

Information security is part of every IT professional's job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. In this IT Security Fundamentals course by Certified Information Systems Security Professional (CISSP) and certified ethical hacker (CEH) Mike Danseglio, you'll learn how to perform these tasks properly and in alignment with industry best practices—a skill that's critical to virtually every technology role, from decision maker to developer.